Breadcrumb

Trojan Virus

Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include:

Deleting data

Blocking data

Modifying data

Copying data

Disrupting the performance of computers or computer networks

Unlike computer viruses and worms , Trojans are not able to self-replicate.

How Trojans can impact you

Trojans are classified according to the type of actions that they can perform on your computer:

BackdoorA backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer - including sending, receiving, launching, and deleting files, displaying data, and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.

ExploitExploits are programs that contain data or code that takes advantage of a vulnerability within application software that's running on your computer.

RootkitRootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected - in order to extend the period in which programs can run on an infected computer.

Trojan-BankerTrojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems, and credit or debit cards.

Trojan-DDoSThese programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests - from your computer and several other infected computers - the attack can overwhelm the target address... leading to a denial of service.

Trojan-DownloaderTrojan-Downloaders can download and install new versions of malicious programs onto your computer - including Trojans and adware.

Trojan-DropperThese programs are used by hackers in order to install Trojans and / or viruses - or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.

Trojan-FakeAVTrojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you - in return for the detection and removal of threats... even though the threats that they report are actually non-existent. Similar to the CryptoLocker virus, or other Ransomware.

Trojan-GameThiefThis type of program steals user account information from online gamers. Stealing World of Warcraft accounts is popular with this type of Trojan.

Trojan-RansomThis type of Trojan can modify data on your computer - so that your computer doesn't run correctly or you can no longer use specific data. The criminal will only restore your computer's performance or unblock your data, after you have paid them the ransom money that they demand (CryptoLocker).